Tag: phishing-resistant MFA

  • YubiKey plugged inside laptopNew Cyber Insurance Requirements: Critical need for Phishing-Resistant MFACome learn new cyber insurance requirements and ways to adopt true phishing-resistant MFA that keeps your business and users protected. Read morecyber insurancemodern authenticationphishing-resistant MFA
  • Accelerate YubiKey adoption at scaleLearn deployment best practices to enhance your security posture with phishing-resistant MFARead moreauthenticationphishing-resistant MFAsecurity
  • Securing federal government with phishing-resistant MFAJoin to hear from government executives on how they are planning for OMB M-22-09, to ensure the highest protection for mobile, cloud platforms and systems that don’t support PIV and CACRead moreExecutive Orderfederal governmentphishing-resistant MFA
  • Compliant PINs and MFA: Modern direction for staying secureEntities within the US Federal Government are in the midst of a drastic change regarding how they approach the services they are using—moving away from traditional on-prem and proprietary systems to cloud services based on private platforms, like Azure and Amazon Web Services. However, the requirements for security remain the same regardless of the platform […]Read moreNISTphishing-resistant MFAPINssmart cardYubiKey
  • Cyber insurance requirements raise the security barThe cyberthreat landscape has always been worrisome, but recent news reports show a sharp growth in highly sophisticated cyber attacks of various kinds, from nation states and other bad actors. Ransomware attacks and other forms of account compromise continue to grace the news every month costing companies billions in downtime and lost opportunity. And in keeping with frequent and large payouts, cyber insurance companies have raised premiums by as much as 150-300%, and requiring organizations looking to purchase cyber insurance coverage to raise their bar for security. Read this solution brief to learn about the changing landscape and requirements, and how to protect your business and users with phishing-resistant multi-factor authentication (MFA).Read morecyber insurancemodern authenticationphishing-resistant MFA
  • Laying the groundwork for continuous authenticationContinuous authentication is an emerging concept—a future ‘nirvana’ state of security that would provide the capability to validate a user’s identity in real-time as they maneuver between systems, applications, and devices. In theory, continuous authentication solutions would use risk signals from a variety of monitoring sources to authenticate users, identify potential threats and proactively remediate […]Read moreauthenticationFIDO U2FFIDO2MFAphishing-resistant MFAzero trust
  • teacher with studentYubiKey for EducationLearn how YubiKeys can complete your MFA 100%, for those in education that can’t, don’t, or won’t use mobile authenticationRead moreeducationmodern authenticationphishing-resistant MFA
  • Best practices to secure hybrid and remote workers with phishing-resistant MFACome learn best practices to secure hybrid and remote workers with phishing-resistant MFA.Read morephishing-resistant MFAremote and hybrid workers
  • Yubico LogoYubico Releases MFA Guide in Recognition of World Password(less) Day PALO ALTO, CA and STOCKHOLM, SWEDEN – May 4, 2022 –  In recognition of World Password Day, Yubico, the leading provider of hardware authentication security keys, today issued a multi-factor authentication (MFA) guide to help better define common and new industry terms, as well as the standards that are supporting modern authentication.   While it is […]Read moreauthenticationMFApasswordlessphishing-resistant MFA
  • Making sense of the alphabet soup within authentication and modern MFA terminologyThe vast majority of all cyberattacks start with stolen login passwords or other credentials. In a world that is moving to the cloud, our work, personal and government communication systems have become more accessible and vulnerable for anyone on the internet. Of all the different cyberattacks, credential phishing is by far the largest problem and […]Read moreauthenticationMFApasswordlessphishing-resistant MFA